https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • Microwave/RF
    • T&D World
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Cybersecurity


News

Motorola Solutions to lead CISA-recognized cybersecurity group for public safety

Motorola Solutions to lead CISA-recognized cybersecurity group for public safety

  • Written by Donny Jackson
  • 4th May 2022

Motorola Solutions recently announced the establishment of the Public Safety Threat Alliance, which is believed to be the first information sharing and analysis organization (ISAO) dedicated to public safety that is recognized by the Cybersecurity and Infrastructure Security Agency (CISA) within the U.S. Department of Homeland Security (DHS).

Public-safety members of the Public Safety Threat Alliance (PSTA) will be able to share cyberthreat information and analyze such information from multiple sources—the goal of a 2015 executive order that identified ISAOs as vehicles for sharing cybersecurity information and best practices.

Brad Stoddard, a member of the National Council of Statewide Interoperability Coordinators (NCSWIC) and director of the Michigan Public Safety Communications Systems (MPSCS), said he believes having an ISAO focus on the public-safety sector will be beneficial. Public-safety representatives have been able to get cyberthreat information from other sources, but not all of the information is relevant to first-responder communications—and sometimes the personnel receiving the information didn’t recognize its public-safety significance, he said.

“In the different states or territories, the IT teams don’t necessarily have a depth of understanding of emergency communications,” Stoddard said during an interview with IWCE’s Urgent Communications. “And that’s not just [land mobile] radio—it could be 911, alert and warning, amateur radio and all of those pieces.”

Tasha Cornish, executive director for the Cybersecurity Association of Maryland—an organization that helps cybersecurity companies grow and provides cybersecurity educational resources to companies and end-user customers—also expressed support for the creation of a public-safety-specific ISAO.

“We were really excited about the announcement of the ISAO,” Cornish said during an interview with IWCE’s Urgent Communications. “We know that a lot of state and local agencies are working really hard to remain cyber prepared, but they have a lot of hats—they don’t often have time to process the threat intelligence that comes through.

“Through the ISAO, this is really a game-changer for those organizations, who will now have actionable steps and resources to protect their systems and data.”

Billy Bob Brown, Jr., CISA’s executive assistant director for emergency communications, echoed this sentiment.

“The establishment of the Public Safety Threat Alliance fills a critical void, creating a single entity entirely focused on the collection, analysis, production and sharing of actionable public safety-focused cyber threat information and intelligence,” Brown said in a prepared statement. “Now, the public-safety community is better equipped to focus their cyber threat intelligence and defense efforts on specific adversaries and their malicious cyberattacks.”

With its considerable investments in the first-responder sector and its resources, Motorola Solutions is a “natural fit” to lead a public-safety-focused ISAO, Stoddard said.

Public-safety entities are eligible to join the PSTA at no cost and receive cybersecurity information released by the group. Information provided by public-safety agencies to the PSTA will be processed by Motorola Solutions, according to answers provided by the company in response to questions to IWCE’s Urgent Communications.

“Members are not required to share any information,” according to the Motorola Solutions response. “However, the more information and intelligence members share with the PSTA about cyberattacks and hacking threats, the better positioned it will be to help ensure the overall cybersecurity posture of the public-safety community.

“As head of the ISAO, Motorola Solutions will access and anonymize raw information and intelligence received to create an actionable intelligence product for agencies to use in thwarting successful hacks and cyberattacks.”

Cornish said she believes that PSTA members will be more comfortable sharing cybersecurity information than in the past, given the ever-changing digital environment that has seen an explosion in ransomware attacks and other cyberthreats.

“I think that threat sharing has been socialized enough now that people are starting to recognize the real strength in the reporting, much more so than even a few years ago,” Cornish said.

In addition, systems used by public safety and other critical-infrastructure entities are being targeted with increasing frequency by sophisticated actors representing nation-states, according to Cornish.

“It’s very scary, because we know that many of their targets are these critical infrastructures that used to be off limits, but now, nothing is off limits,” Cornish said.

Scott Kaine, Motorola Solutions’ corporate vice president of cybersecurity, said recent cybersecurity statistics reinforce the need for the PSTA.

“For example, it’s been reported that there was a 1,885 percent increase in ransomware attacks against governments worldwide in 2021,” said Scott Kaine, corporate vice president of Cybersecurity, Motorola Solutions. “With cyberthreats increasing in scope, scale and complexity, the Public Safety Threat Alliance can help to dramatically increase the efficacy with which intelligence is used to monitor, detect and respond to potential threats before they result in downtime of public safety services.”

For many years, cybersecurity was not considered to be an urgent priority for many public-safety entities, because most of their mission-critical systems were isolated in “silos.” But that dynamic has changed significantly during the past two decades, as policies—and funding—have been developed that encourage interoperability and connectivity between a variety of systems, enabling new functionalities and efficiencies.

But that this new level of connectivity between systems—many of which have very different security profiles—also expands the risk of cyberthreats, Stoddard said. Through an ISAO, there is a greater chance that all entities within an interoperable ecosystem have similar knowledge of the cyberthreat landscape at a given time, improving the security for all entities involved, he said.

“Now, everyone’s going to be connected together, … so it’s a mutual risk across everybody,” Stoddard said. “It doesn’t matter what system it is, they all have some level of connection, and that’s the same across all of the states and territories.”

Cornish agreed.

“Every couple of weeks—sometimes more frequently than that—I hear another story of somebody getting in through an attack vector that folks didn’t even know was connected to the Internet,” Cornish said. “They didn’t even know it could be a source of entry into the network.

“They [Motorola Solutions] have their work cut out for them. There’s a lot of data to sort through, … but I am secure in knowing that they will be able to figure out and bring to the top what are really the biggest threats to public safety.”

Motorola Solutions plans to reach out “in the coming weeks” to its public-safety customer base—the largest in the sector—with information outlining how agencies can participate in the PSTA, according to a company spokesperson.

“Membership in the PSTA is open to all public-safety agencies, who will receive public-safety information sharing and analysis (i.e., studies, reports, anonymized proprietary data, publicly reported data and closed source cyber intelligence), free of charge,” according to the Motorola Solutions response provided to IWCE’s Urgent Communications.

Agencies that are not Motorola Solutions customers are welcome to join the ISAO. However, Stoddard and Cornish acknowledged that such arrangements could be more complicated to execute practically, given potential concerns surrounding the prospect of sharing sensitive nature of system information with another vendor.

 

Tags: homepage-featured-4 Alerting Systems Analytics Applications Companies Critical Infrastructure Cybersecurity DHS Federal Government/Military Funding Incident Command/Situational Awareness News Policy Public Safety Security Software State & Local Government System Design System Operation Test & Measurement Tracking, Monitoring & Control News

Most Recent


  • Panasonic Connect launches Toughbook 40 rugged laptop
    Panasonic Connect this week announced the launch of the Toughbook 40, the highest-performing device in the family of fully rugged laptops, featuring LTE-Advanced and CBRS connectivity, and a lighter total weight, despite  boasting a 14-inch touchscreen display that is larger than the previous model in the Toughbook portfolio. In addition to all of its improved […]
  • Motorola Solutions to lead CISA-recognized cybersecurity group for public safety
    Newscan: ‘Predator’ spyware let government hackers break into Chrome and Android, Google says
    Web Roundup Items from other news organizations ‘Predator’ spyware let government hackers break into Chrome and Android, Google says A private firm exposes Chrome vulnerabilities to government hackers, says Google EPA seeks funding to improve water-system cybersecurity Philadelphia launches real-time smart-city project NIST’s supply-chain security guidance tells agencies: Look to FedRAMP first Senate report highlights […]
  • Malicious Python Repository Package drops Cobalt Strike on Windows, macOS & Linux systems
    Public repositories of open source code are a critical part of the software supply chain that many organizations use to build applications. They are therefore an attractive target for adversaries seeking to distribute malware to a mass audience. The latest case in point is a malicious package for distributing Cobalt Strike on Windows, macOS, and Linux systems, […]
  • T-Mobile's CEO explains the company's new private 5G strategy
    T-Mobile on Monday took the wraps off its new private wireless networking offerings, and the company’s CEO spoke about it at length during an investor event. “CIOs everywhere are interested in this topic right now,” T-Mobile’s Mike Sievert said Monday at the J.P. Morgan Global Technology, Media and Communications Conference. “And they’re interested in it for a reason. […]

One comment

  1. Avatar Third-order-hit 4th May 2022 @ 5:06 pm
    Reply

    Any comments from Tait, Harris or Kenwood?

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Partnership and collaboration must be the foundation for emergency communications
  • IWCE 2022: Interoperability highlighted; ‘We are, in fact, stronger together’
  • IWCE 2022: Public-safety digital security and the threat of cyberattacks
  • Cybersecurity leaders urge digital defense awareness, preparation in light of Russia invasion

Commentary


LTE and liability: Why the fire service must move forward with digital incident command

  • 2
6th May 2022

Partnership and collaboration must be the foundation for emergency communications

18th April 2022

FirstNet success means no hypothetical ‘shots’ need to be fired, Swenson says

22nd February 2022
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Panasonic Connect launches Toughbook 40 rugged laptop dlvr.it/SR5vl2

26th May 2022
UrgentComm

Newscan: ‘Predator’ spyware let government hackers break into Chrome and Android, Google says dlvr.it/SR2lBG

25th May 2022
UrgentComm

Malicious Python Repository Package drops Cobalt Strike on Windows, macOS & Linux systems dlvr.it/SR0Qb2

24th May 2022
UrgentComm

T-Mobile’s CEO explains the company’s new private 5G strategy dlvr.it/SQyzhc

24th May 2022
UrgentComm

Hytera, Motorola Solutions refile appeal, cross-appeal in civil case dlvr.it/SQxNX1

24th May 2022
UrgentComm

Amid shifting workplace expectations, local government employers must adapt dlvr.it/SQwVVs

23rd May 2022
UrgentComm

The private-wireless networking opportunity shouldn’t stay too private dlvr.it/SQw7MT

23rd May 2022
UrgentComm

Europe’s first driverless-car test completed dlvr.it/SQvqyY

23rd May 2022

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • Microwave/RF
  • T&D World
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X